Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/thunderbird@0?distro=trixie
purl pkg:deb/debian/thunderbird@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (109)
Vulnerability Summary Aliases
VCID-19r2-4svk-uydr Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4578
VCID-1dkk-86db-s3ch Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-5168
VCID-1jvh-anus-rfeg When receiving an HTML email that specified to load an iframe element from a remote location, a request to the remote document was sent. However, Thunderbird didn't display the document. CVE-2022-3034
VCID-1rj3-tt63-4yc1 Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. CVE-2021-38497
VCID-1z5d-4wfm-8yfk Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2024-9396
VCID-2a5d-8cac-mkft A newline in a filename could have been used to bypass the file extension security mechanisms that replace malicious file extensions such as .lnk with .download. This could have led to accidental execution of malicious code.*This bug only affects Firefox on Windows. Other versions of Firefox are unaffected.* CVE-2023-29542
VCID-2z7p-2uj3-2qfb If hyperthreading is not disabled, a timing attack vulnerability exists, similar to previous Spectre attacks. Apple has shipped macOS 10.14.5 with an option to disable hyperthreading in applications running untrusted code in a thread through a new sysctl. Firefox now makes use of it on the main thread and any worker threads. *Note: users need to update to macOS 10.14.5 in order to take advantage of this change.* CVE-2019-9815
VCID-3sjh-f264-m3g7 Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2024-8387
VCID-4c3c-ygt3-kbg5 Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which may allow execution of arbitrary code. CVE-2020-6797
VCID-4r8e-64b6-bbbu Use-after-free in the Widget: Cocoa component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9. CVE-2026-4711
VCID-4sv2-j8zg-xkhf When running, the updater service wrote status and log files to an unrestricted location; potentially allowing an unprivileged process to locate and exploit a vulnerability in file handling in the updater service. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.* CVE-2019-17009
VCID-4vps-3cxv-xyd5 On Windows 10, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as .url by including an invalid character in the extension. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. CVE-2024-5692
VCID-5666-pp89-aqc2 The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution.*Note: this issue only affects Firefox on Windows operating systems.* CVE-2020-12393
VCID-5aga-y5nk-5fha A locally-installed hostile program could send `WM_COPYDATA` messages that Firefox would processing incorrectly, leading to an out-of-bounds read. *This bug only affects Firefox on Windows. Other operating systems are unaffected.* CVE-2021-29964
VCID-5c1p-6gjw-wkgx Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to the execution of arbitrary code. CVE-2018-12391
VCID-5srb-q1nd-1qfh A buffer overflow occurs when drawing and validating elements using Direct 3D 9 with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash. *Note: This attack only affects Windows operating systems. Other operating systems are unaffected.* CVE-2017-7845
VCID-5zmj-5xkc-zkgc A vulnerability exists in the Windows sandbox where an uninitialized value in memory can be leaked to a renderer from a broker when making a call to access an otherwise unavailable file. This results in the potential leaking of information stored at that memory location. *Note: this issue only occurs on Windows. Other operating systems are unaffected.* CVE-2019-11694
VCID-62zr-8w1c-bydt Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2024-8394
VCID-6dgw-qbue-nqax If a Thunderbird user replied to a crafted HTML email containing a meta tag, with the meta tag having the http-equiv="refresh" attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified in the document. This bug doesn't affect users who have changed the default Message Body display setting to 'simple html' or 'plain text'. CVE-2022-3033
VCID-6h7s-a74e-33c1 Mozilla developer Anne van Kesteren discovered that <iframe sandbox> with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed popups and hosted arbitrary content. CVE-2020-15653
VCID-6s88-vfr8-u3hj Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4585
VCID-6zjy-1agk-nbd9 Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-5174
VCID-74zp-pzc4-efhm Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code. CVE-2021-38495
VCID-754j-7erb-z7ae Mozilla Firefox's update mechanism allowed a medium-integrity user process to interfere with the SYSTEM-level updater by manipulating the file-locking behavior. By injecting code into the user-privileged process, an attacker could bypass intended access controls, allowing SYSTEM-level file operations on paths controlled by a non-privileged user and enabling privilege escalation. CVE-2025-2817
VCID-7939-5qcd-tqgg Modification of specific WebGL shader attributes could trigger an out-of-bounds read, which, when chained with other vulnerabilities, could be used to escalate privileges.*This bug only affects Firefox for macOS. Other versions of Firefox are unaffected.* CVE-2025-4082
VCID-7fvy-7hpe-kbej Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code. CVE-2021-38492
VCID-7sbd-1n7f-ryed Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4057
VCID-7u5b-uzd5-7kdc Certain WebGL operations on Apple silicon M series devices could have lead to an out-of-bounds write and memory corruption due to a flaw in Apple's GPU driver. *This bug only affected the application on Apple M series hardware. Other platforms were unaffected.* CVE-2024-11691
VCID-8cv4-kvfj-4uek Mozilla community member Philipp reported a memory safety bug present in Firefox 68 when 360 Total Security was installed. This bug showed evidence of memory corruption in the accessibility engine and we presume that with enough effort that it could be exploited to run arbitrary code. CVE-2019-11758
VCID-8hgj-7cb6-fbbp A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.* CVE-2019-9818
VCID-8kgq-qhy6-e3c2 Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution. CVE-2022-38476
VCID-8uk6-x62z-uybr Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code. CVE-2022-2505
VCID-9dpt-xfu6-cuh5 Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4580
VCID-9tc4-qr6d-6kfu When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when interactions with existing browser dialogs and warnings do not work. CVE-2020-15654
VCID-9tnr-m8mg-3ffw Due to insufficient escaping of the ampersand character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system.*This bug only affects Firefox for Windows. Other versions of Firefox are unaffected.* CVE-2025-5265
VCID-9u64-4cr7-w3e1 The Mozilla Foundation has reported numerous security vulnerabilities related to Mozilla SeaMonkey. CVE-2006-3677
VCID-9y48-sjn7-rqeu Mozilla developers and community members Kevin Brosnan, Mihai Alexandru Michis, and Christian Holler reported memory safety bugs present in Thunderbird 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. CVE-2021-38501
VCID-a2as-nfu2-ykax Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-32214
VCID-akhr-nck5-sfh2 When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.This bug only affects Thunderbird for Windows. Other operating systems are unaffected.* CVE-2022-36314
VCID-avgs-nz9j-gqg8 On Windows, a compromised content process could use bad StreamData sent over AudioIPC to trigger a use-after-free in the Browser process. This could have led to a sandbox escape. CVE-2025-1930
VCID-awnf-jwg6-k3bk Mozilla Developer Rob Wu discovered that a redirected HTTP request which is observed or modified through a web extension could bypass existing CORS checks, leading to potential disclosure of cross-origin information. CVE-2020-15655
VCID-ax8a-z9s4-e3dk A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.* CVE-2019-9794
VCID-b6ug-rdyx-4uaw Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2024-8900
VCID-b8qk-zbj4-yfg2 When setting a thread name on Windows in WebRTC, an incorrect number of arguments could have been supplied, leading to stack corruption and a potentially exploitable crash. *Note: this issue only occurs on Windows. Other operating systems are unaffected.* CVE-2019-13722
VCID-bd6g-ev4d-kyf6 Multiple vulnerabilities have been found in Mozilla Thunderbird and Firefox, the worst of which could lead to the execution of arbitrary code. CVE-2018-18335
VCID-bsnh-1chq-z7ae Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2024-9400
VCID-c52k-tg8d-sbeg Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution. CVE-2023-23599
VCID-cfqv-7r6b-g3e9 Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4576
VCID-cmnc-fyxb-rfd4 An attacker could have caused an out of bounds memory access using WebGL APIs, leading to memory corruption and a potentially exploitable crash.*This bug only affects Firefox for macOS. Other operating systems are unaffected.* CVE-2023-29531
VCID-cw2e-p5x2-j7fu Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. In versions prior to 19.4.0 events sent with special strings in key places can temporarily disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This issue has been fixed in matrix-js-sdk 19.4.0 and users are advised to upgrade. Users unable to upgrade may mitigate this issue by redacting applicable events, waiting for the sync processor to store data, and restarting the client. Alternatively, redacting the applicable events and clearing all storage will often fix most perceived issues. In some cases, no workarounds are possible. CVE-2022-36059
GHSA-rfv9-x7hh-xc32
VCID-dveb-sthz-bkgu Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution. CVE-2023-25738
VCID-dwy5-7rms-rkg6 Multiple vulnerabilities have been found in Mozilla Thunderbird, the world of which could result in arbitrary code execution. CVE-2022-3155
VCID-e7p8-zrwx-5ug6 A flaw in handling fullscreen transitions may have inadvertently caused the application to become stuck in fullscreen mode when a modal dialog was opened during the transition. This issue left users unable to exit fullscreen mode using standard actions like pressing "Esc" or accessing right-click menus, resulting in a disrupted browsing experience until the browser is restarted. *This bug only affects the application when running on macOS. Other operating systems are unaffected.* CVE-2024-11698
VCID-ebhp-kzkz-euhu Similar to CVE-2023-28163, this time when choosing 'Save Link As', suggested filenames containing environment variable names would have resolved those in the context of the current user. *This bug only affects Firefox on Windows. Other versions of Firefox are unaffected.* CVE-2023-29545
VCID-efvs-1tuf-guf4 Information disclosure in the Widget: Cocoa component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9. CVE-2026-4712
VCID-f4ja-2ydw-cufu The executable file warning was not presented when downloading .library-ms files. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* CVE-2024-11693
VCID-f8c7-p8nz-bbap A local attacker can trick the Mozilla Maintenance Service into applying an unsigned update file by pointing the service at an update file on a malicious SMB server. The update file can be replaced after the signature check, before the use, because the write-lock requested by the service does not work on a SMB server.*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.* CVE-2023-29532
VCID-g2et-bnvt-9fem During the initialization of a new content process, a race condition occurs that can allow a content process to disclose heap addresses from the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.* CVE-2019-17021
VCID-h4r6-jrxh-6kcf JIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity. CVE-2020-15656
VCID-hhu1-cgcx-nfev During process shutdown, a document could have caused a use-after-free of a languages service object, leading to memory corruption and a potentially exploitable crash. CVE-2021-38498
VCID-j2ax-jb2h-byeu Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4052
VCID-jebk-6hja-ukfc Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2024-9402
VCID-k3ec-bt9r-pkhg Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2024-9397
VCID-kpun-mgtm-5uhd Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2024-9399
VCID-krg2-d4vy-z7fu During the initialization of a new content process, a pointer offset can be manipulated leading to memory corruption and a potentially exploitable crash in the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.* CVE-2019-17015
VCID-m92a-91pv-dffv If a user downloaded a file lacking an extension on Windows, and then "Open"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* CVE-2020-35112
VCID-mkyz-6v1k-wyen Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code. CVE-2021-29987
VCID-mp4n-ez8p-63ek Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution. CVE-2023-28163
VCID-mqte-f1hw-2ya5 Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code. CVE-2022-22753
VCID-mup7-wezz-gkgc When receiving an HTML email that contained an iframe element, which used a srcdoc attribute to define the inner HTML document, remote objects specified in the nested document, for example images or videos, were not blocked. Rather, the network was accessed, the objects were loaded and displayed. CVE-2022-3032
VCID-myv9-89b8-w7dm In the Windows 10 April 2018 Update, Windows Defender SmartScreen honors the SEE_MASK_FLAG_NO_UI flag associated with downloaded files and will not show any UI. Files that are unknown and potentially dangerous will be allowed to run because SmartScreen will not prompt the user for a decision, and if the user is offline all files will be allowed to be opened because Windows won’t prompt the user to ask what to do. Firefox incorrectly sets this flag when downloading files, leading to less secure behavior from SmartScreen. *Note: this issue only affects Windows 10 users running the April 2018 update or later. It does not affect other Windows users or other operating systems.* CVE-2018-5174
VCID-n8hk-44ah-bugr Due to insufficient escaping of the ampersand character in the "copy as cURL" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system.*This bug only affects Firefox for Windows. Other versions of Firefox are unaffected.* CVE-2025-4084
VCID-pmkt-c3bw-zkhz By checking the result of calls to `window.open` with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed. CVE-2024-9398
VCID-pn68-e9g7-qbf1 The executable file warning did not warn users before opening files with the terminal extension. *This bug only affects Thunderbird for macOS. Other versions of Thunderbird are unaffected.* CVE-2025-6426
VCID-pst5-367g-h7cs Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2024-8386
VCID-pv9q-fcta-ffbq Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4577
VCID-q5ch-b97k-k3hp Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code. CVE-2021-29982
VCID-q77k-hc9g-9fhm The Mozilla Maintenance Service granted SERVICE_START access to BUILTIN|Users which, in a domain network, grants normal remote users access to start or stop the service. This could be used to prevent the browser update service from operating (if an attacker spammed the 'Stop' command); but also exposed attack surface in the maintenance service.*Note: This issue only affected Windows operating systems older than Win 10 build 1709. Other operating systems are unaffected.* CVE-2021-29951
VCID-qd97-asaa-2fey Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2024-8385
VCID-qhwf-9n5n-hbaa The code for downloading files did not properly take care of special characters, which led to an attacker being able to cut off the file ending at an earlier position, leading to a different file type being downloaded than shown in the dialog. CVE-2020-15658
VCID-qv7a-3c41-x3cr Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution. CVE-2022-38477
VCID-rsy6-acfe-ffb5 The constructed curl command from the "Copy as curl" feature in DevTools was not properly escaped for PowerShell. This could have lead to command injection if pasted into a Powershell prompt.*This bug only affects Firefox for Windows. Other operating systems are unaffected.* CVE-2022-22744
VCID-s3vw-7gyn-ubdt Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-3600
VCID-sjy7-cp3x-nfh2 Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which may allow execution of arbitrary code. CVE-2018-12368
VCID-snbc-j4e3-uff1 Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4582
VCID-t769-2t1u-57b6 Microsoft introduced a new feature in Windows 10 known as Cloud Clipboard which, if enabled, will record data copied to the clipboard to the cloud, and make it available on other computers in certain scenarios. Applications that wish to prevent copied data from being recorded in Cloud History must use specific clipboard formats; and Firefox before versions 94 and ESR 91.3 did not implement them. This could have caused sensitive data to be recorded to a user's Microsoft account.*This bug only affects Firefox for Windows 10+ with Cloud Clipboard enabled. Other operating systems are unaffected.* CVE-2021-38505
VCID-t8mb-cdc3-6ydq Due to large allocation checks in Angle for GLSL shaders being too lenient an out-of-bounds access could occur when allocating more than 8192 ints in private shader memory on mac OS. CVE-2024-6600
VCID-tfny-yt17-mffx Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4054
VCID-tjp3-ck7p-5qg3 An attacker could have leveraged the Windows Error Reporter to run arbitrary code on the system escaping the sandbox. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. CVE-2024-2605
VCID-tnxh-tgsm-tuex A race condition could have allowed bypassing the fullscreen notification which could have lead to a fullscreen window spoof being unnoticed.*This bug only affects Firefox for Windows. Other operating systems are unaffected.* CVE-2022-22746
VCID-tq43-rx5u-eybv Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4583
VCID-u5n5-6h82-tqhw Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution. CVE-2023-25734
VCID-urpr-qse2-7kcf Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* CVE-2020-26966
VCID-uuc6-a3xx-6khk Firefox will accept any registered Program ID as an external protocol handler and offer to launch this local application when given a matching URL on Windows operating systems. This should only happen if the program has specifically registered itself as a "URL Handler" in the Windows registry. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.* CVE-2019-9801
VCID-v9ua-1tey-cyaa Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution. CVE-2022-46875
VCID-vtjf-sufh-p3h4 crossbeam-deque Data Race before v0.7.4 and v0.8.1 ### Impact In the affected version of this crate, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug. Crates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue. ### Patches This has been fixed in crossbeam-deque 0.8.1 and 0.7.4. ### Credits This issue was reported and fixed by Maor Kleinberger. ### License This advisory is in the public domain. CVE-2021-32810
GHSA-pqqp-xmhj-wgcw
VCID-vun4-z8ju-gbbc If Firefox is installed to a user-writable directory, the Mozilla Maintenance Service would execute updater.exe from the install location with administrative privileges. Although the Mozilla Maintenance Service does ensure that updater.exe is signed by Mozilla, the version could have been rolled back to a previous version which would have allowed exploitation of an older bug and arbitrary code execution with system privileges.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* CVE-2020-15663
VCID-vw4n-4r41-ukbp Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-5727
VCID-vzg5-b77s-g3ft Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code. CVE-2022-34478
VCID-wk26-kc1d-9qcy Firefox could be made to load attacker-supplied DLL files from the installation directory. This required an attacker that is already capable of placing files in the installation directory. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* CVE-2020-15657
VCID-wzxk-316c-xqcg When downloading files on Windows, the % character was not escaped, which could have lead to a download incorrectly being saved to attacker-influenced paths that used variables such as %HOMEPATH% or %APPDATA%.*This bug only affects Firefox for Windows. Other operating systems are unaffected.* CVE-2022-31739
VCID-x8sj-apw2-e3h6 Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code. CVE-2021-29981
VCID-xrg1-azru-5qf1 Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4051
VCID-yfmg-82tr-gfec The executable file warning was not presented when downloading .inetloc files, which, due to a flaw in Mac OS, can run commands on a user's computer.*Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.* CVE-2021-38510
VCID-ygrd-4scr-wkau Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-4053
VCID-yust-3g8v-muas The executable file warning was not presented when downloading .xrm-ms files. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* CVE-2024-3863
VCID-z23q-ts2f-17a3 Normally Mozilla-based clients prevent web content from linking to local files but Eric Foley reports a partial bypass of this restriction by using Windows filename syntax (on a Windows computer) rather than a file:/// URL as the SRC= attribute. The image will not be loaded on the web page--it will appear as a broken image--but if a user can be convinced to right-click and select "View Image" then the content will be loaded. Since the image will replace the current document attacker script cannot be run on it. Loading a local file at a known location is about the extent of this attack.If the local file is a media file an external helper program may be launched to play the media depending on your settings. The action will be the same as if you had clicked on a remote link of the same media type and does not present any additional risk. Local files identified as executable will never be opened in this way, with "executable" broadly defined on windows to include many scriptable document formats with a history of being abused.By referencing a local device rather than a file this could be used as a limited denial-of-service attack to hang the browser. CVE-2006-1942
VCID-zdbt-zhtq-xfhj Insufficient escaping in the “Copy as cURL” feature could have been used to trick a user into executing unexpected code on Windows. This did not affect Firefox running on other operating systems. CVE-2025-11713
VCID-zjn8-79ab-tqd3 Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. CVE-2023-5726

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:31:34.064606+00:00 Debian Importer Fixing VCID-62zr-8w1c-bydt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:29:16.262630+00:00 Debian Importer Fixing VCID-m92a-91pv-dffv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:28:13.890436+00:00 Debian Importer Fixing VCID-4vps-3cxv-xyd5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:26:40.692655+00:00 Debian Importer Fixing VCID-8hgj-7cb6-fbbp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:24:09.086067+00:00 Debian Importer Fixing VCID-k3ec-bt9r-pkhg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:20:21.793843+00:00 Debian Importer Fixing VCID-q77k-hc9g-9fhm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:19:29.910432+00:00 Debian Importer Fixing VCID-j2ax-jb2h-byeu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:18:00.946032+00:00 Debian Importer Fixing VCID-9y48-sjn7-rqeu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:12:26.531253+00:00 Debian Importer Fixing VCID-vw4n-4r41-ukbp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:11:21.428259+00:00 Debian Importer Fixing VCID-tfny-yt17-mffx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:10:14.836336+00:00 Debian Importer Fixing VCID-7fvy-7hpe-kbej https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:07:35.575188+00:00 Debian Importer Fixing VCID-5666-pp89-aqc2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:04:54.617164+00:00 Debian Importer Fixing VCID-5aga-y5nk-5fha https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:59:58.729994+00:00 Debian Importer Fixing VCID-ygrd-4scr-wkau https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:59:04.296243+00:00 Debian Importer Fixing VCID-qhwf-9n5n-hbaa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:57:35.732819+00:00 Debian Importer Fixing VCID-tnxh-tgsm-tuex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:53:58.948334+00:00 Debian Importer Fixing VCID-tjp3-ck7p-5qg3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:53:46.092054+00:00 Debian Importer Fixing VCID-f4ja-2ydw-cufu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:47:58.879014+00:00 Debian Importer Fixing VCID-5c1p-6gjw-wkgx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:41:59.353449+00:00 Debian Importer Fixing VCID-b8qk-zbj4-yfg2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:38:02.065667+00:00 Debian Importer Fixing VCID-8uk6-x62z-uybr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:35:16.528066+00:00 Debian Importer Fixing VCID-g2et-bnvt-9fem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:29:38.815676+00:00 Debian Importer Fixing VCID-b6ug-rdyx-4uaw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:29:16.853746+00:00 Debian Importer Fixing VCID-f8c7-p8nz-bbap https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:28:14.871655+00:00 Debian Importer Fixing VCID-mup7-wezz-gkgc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:27:33.083410+00:00 Debian Importer Fixing VCID-urpr-qse2-7kcf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:27:06.907480+00:00 Debian Importer Fixing VCID-qv7a-3c41-x3cr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:26:10.549978+00:00 Debian Importer Fixing VCID-c52k-tg8d-sbeg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:25:04.173814+00:00 Debian Importer Fixing VCID-jebk-6hja-ukfc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:24:24.472778+00:00 Debian Importer Fixing VCID-zdbt-zhtq-xfhj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:19:44.193305+00:00 Debian Importer Fixing VCID-6dgw-qbue-nqax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:16:38.299900+00:00 Debian Importer Fixing VCID-q5ch-b97k-k3hp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:14:14.312818+00:00 Debian Importer Fixing VCID-v9ua-1tey-cyaa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:12:55.633745+00:00 Debian Importer Fixing VCID-cmnc-fyxb-rfd4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:09:25.623911+00:00 Debian Importer Fixing VCID-rsy6-acfe-ffb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:09:19.477903+00:00 Debian Importer Fixing VCID-uuc6-a3xx-6khk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:05:13.899086+00:00 Debian Importer Fixing VCID-dwy5-7rms-rkg6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:02:27.496593+00:00 Debian Importer Fixing VCID-wk26-kc1d-9qcy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:00:34.467968+00:00 Debian Importer Fixing VCID-mqte-f1hw-2ya5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:59:40.234847+00:00 Debian Importer Fixing VCID-awnf-jwg6-k3bk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:57:11.939420+00:00 Debian Importer Fixing VCID-t769-2t1u-57b6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:51:50.544414+00:00 Debian Importer Fixing VCID-qd97-asaa-2fey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:44:05.406644+00:00 Debian Importer Fixing VCID-bd6g-ev4d-kyf6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:43:53.345633+00:00 Debian Importer Fixing VCID-akhr-nck5-sfh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:43:36.055651+00:00 Debian Importer Fixing VCID-4sv2-j8zg-xkhf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:43:32.327119+00:00 Debian Importer Fixing VCID-pv9q-fcta-ffbq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:36:45.531313+00:00 Debian Importer Fixing VCID-9tc4-qr6d-6kfu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:34:57.634967+00:00 Debian Importer Fixing VCID-avgs-nz9j-gqg8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:34:27.953859+00:00 Debian Importer Fixing VCID-z23q-ts2f-17a3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:32:57.187092+00:00 Debian Importer Fixing VCID-5srb-q1nd-1qfh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:32:54.766315+00:00 Debian Importer Fixing VCID-t8mb-cdc3-6ydq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:27:47.664319+00:00 Debian Importer Fixing VCID-ax8a-z9s4-e3dk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:23:49.697825+00:00 Debian Importer Fixing VCID-efvs-1tuf-guf4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:18:37.946018+00:00 Debian Importer Fixing VCID-yfmg-82tr-gfec https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:16:54.819408+00:00 Debian Importer Fixing VCID-1rj3-tt63-4yc1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:10:31.963273+00:00 Debian Importer Fixing VCID-cfqv-7r6b-g3e9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:08:03.160001+00:00 Debian Importer Fixing VCID-hhu1-cgcx-nfev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:57:44.257035+00:00 Debian Importer Fixing VCID-2z7p-2uj3-2qfb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:56:45.567069+00:00 Debian Importer Fixing VCID-8kgq-qhy6-e3c2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:53:30.204860+00:00 Debian Importer Fixing VCID-19r2-4svk-uydr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:51:31.939468+00:00 Debian Importer Fixing VCID-9u64-4cr7-w3e1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:46:20.362356+00:00 Debian Importer Fixing VCID-xrg1-azru-5qf1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:42:39.099209+00:00 Debian Importer Fixing VCID-bsnh-1chq-z7ae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:41:38.288628+00:00 Debian Importer Fixing VCID-ebhp-kzkz-euhu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:40:02.532264+00:00 Debian Importer Fixing VCID-pst5-367g-h7cs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:34:10.620035+00:00 Debian Importer Fixing VCID-wzxk-316c-xqcg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:32:36.407218+00:00 Debian Importer Fixing VCID-6h7s-a74e-33c1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:30:00.481831+00:00 Debian Importer Fixing VCID-cw2e-p5x2-j7fu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:26:30.704402+00:00 Debian Importer Fixing VCID-1dkk-86db-s3ch https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:53.223448+00:00 Debian Importer Fixing VCID-vtjf-sufh-p3h4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:24.840142+00:00 Debian Importer Fixing VCID-1z5d-4wfm-8yfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:20:50.809763+00:00 Debian Importer Fixing VCID-krg2-d4vy-z7fu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:26.794705+00:00 Debian Importer Fixing VCID-9tnr-m8mg-3ffw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:11:56.628740+00:00 Debian Importer Fixing VCID-pmkt-c3bw-zkhz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:07:42.099003+00:00 Debian Importer Fixing VCID-mp4n-ez8p-63ek https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:06:32.826076+00:00 Debian Importer Fixing VCID-zjn8-79ab-tqd3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:03:45.409655+00:00 Debian Importer Fixing VCID-74zp-pzc4-efhm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:01:40.087561+00:00 Debian Importer Fixing VCID-8cv4-kvfj-4uek https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:01:16.663888+00:00 Debian Importer Fixing VCID-3sjh-f264-m3g7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:25.420407+00:00 Debian Importer Fixing VCID-pn68-e9g7-qbf1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:59:51.102351+00:00 Debian Importer Fixing VCID-x8sj-apw2-e3h6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:58:39.087929+00:00 Debian Importer Fixing VCID-5zmj-5xkc-zkgc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:55:40.984906+00:00 Debian Importer Fixing VCID-e7p8-zrwx-5ug6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:52:15.483694+00:00 Debian Importer Fixing VCID-kpun-mgtm-5uhd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:51:38.475625+00:00 Debian Importer Fixing VCID-4r8e-64b6-bbbu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:33.055588+00:00 Debian Importer Fixing VCID-h4r6-jrxh-6kcf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:26.934751+00:00 Debian Importer Fixing VCID-2a5d-8cac-mkft https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:43:26.249583+00:00 Debian Importer Fixing VCID-754j-7erb-z7ae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:47.064233+00:00 Debian Importer Fixing VCID-6s88-vfr8-u3hj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:28:38.525216+00:00 Debian Importer Fixing VCID-9dpt-xfu6-cuh5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:28:35.042522+00:00 Debian Importer Fixing VCID-snbc-j4e3-uff1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:41.861861+00:00 Debian Importer Fixing VCID-6zjy-1agk-nbd9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:01.462264+00:00 Debian Importer Fixing VCID-vzg5-b77s-g3ft https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:09:35.324194+00:00 Debian Importer Fixing VCID-n8hk-44ah-bugr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:14.995149+00:00 Debian Importer Fixing VCID-dveb-sthz-bkgu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:05:12.604739+00:00 Debian Importer Fixing VCID-u5n5-6h82-tqhw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:07.776543+00:00 Debian Importer Fixing VCID-yust-3g8v-muas https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:21.111970+00:00 Debian Importer Fixing VCID-7u5b-uzd5-7kdc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:42.944292+00:00 Debian Importer Fixing VCID-7939-5qcd-tqgg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:48.612068+00:00 Debian Importer Fixing VCID-myv9-89b8-w7dm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:32.779081+00:00 Debian Importer Fixing VCID-4c3c-ygt3-kbg5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:35.718697+00:00 Debian Importer Fixing VCID-1jvh-anus-rfeg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:31.273197+00:00 Debian Importer Fixing VCID-a2as-nfu2-ykax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:36.880419+00:00 Debian Importer Fixing VCID-s3vw-7gyn-ubdt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:10.360418+00:00 Debian Importer Fixing VCID-sjy7-cp3x-nfh2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:36.006705+00:00 Debian Importer Fixing VCID-mkyz-6v1k-wyen https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:47.138470+00:00 Debian Importer Fixing VCID-vun4-z8ju-gbbc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:02.070695+00:00 Debian Importer Fixing VCID-7sbd-1n7f-ryed https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:07.668795+00:00 Debian Importer Fixing VCID-tq43-rx5u-eybv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:20:10.081534+00:00 Debian Importer Fixing VCID-62zr-8w1c-bydt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:18:27.428290+00:00 Debian Importer Fixing VCID-m92a-91pv-dffv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:17:42.117964+00:00 Debian Importer Fixing VCID-4vps-3cxv-xyd5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:16:32.419122+00:00 Debian Importer Fixing VCID-8hgj-7cb6-fbbp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:14:37.235595+00:00 Debian Importer Fixing VCID-k3ec-bt9r-pkhg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:11:36.761170+00:00 Debian Importer Fixing VCID-q77k-hc9g-9fhm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:10:54.911689+00:00 Debian Importer Fixing VCID-j2ax-jb2h-byeu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:09:41.641401+00:00 Debian Importer Fixing VCID-9y48-sjn7-rqeu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:05:23.918252+00:00 Debian Importer Fixing VCID-vw4n-4r41-ukbp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:04:32.405613+00:00 Debian Importer Fixing VCID-tfny-yt17-mffx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:03:41.561723+00:00 Debian Importer Fixing VCID-7fvy-7hpe-kbej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:01:40.426469+00:00 Debian Importer Fixing VCID-5666-pp89-aqc2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:59:40.638427+00:00 Debian Importer Fixing VCID-5aga-y5nk-5fha https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:55:58.630685+00:00 Debian Importer Fixing VCID-ygrd-4scr-wkau https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:55:15.368901+00:00 Debian Importer Fixing VCID-qhwf-9n5n-hbaa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:54:07.131690+00:00 Debian Importer Fixing VCID-tnxh-tgsm-tuex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:51:24.206049+00:00 Debian Importer Fixing VCID-tjp3-ck7p-5qg3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:51:14.779384+00:00 Debian Importer Fixing VCID-f4ja-2ydw-cufu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:46:49.172571+00:00 Debian Importer Fixing VCID-5c1p-6gjw-wkgx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:42:19.615973+00:00 Debian Importer Fixing VCID-b8qk-zbj4-yfg2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:39:22.404058+00:00 Debian Importer Fixing VCID-8uk6-x62z-uybr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:37:19.011055+00:00 Debian Importer Fixing VCID-g2et-bnvt-9fem https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:33:13.726274+00:00 Debian Importer Fixing VCID-b6ug-rdyx-4uaw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:32:58.878087+00:00 Debian Importer Fixing VCID-f8c7-p8nz-bbap https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:32:14.630724+00:00 Debian Importer Fixing VCID-mup7-wezz-gkgc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:31:42.619417+00:00 Debian Importer Fixing VCID-urpr-qse2-7kcf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:31:23.703334+00:00 Debian Importer Fixing VCID-qv7a-3c41-x3cr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:30:43.425708+00:00 Debian Importer Fixing VCID-c52k-tg8d-sbeg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:29:58.340795+00:00 Debian Importer Fixing VCID-jebk-6hja-ukfc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:29:29.636375+00:00 Debian Importer Fixing VCID-zdbt-zhtq-xfhj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:26:00.719478+00:00 Debian Importer Fixing VCID-6dgw-qbue-nqax https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:23:45.752943+00:00 Debian Importer Fixing VCID-q5ch-b97k-k3hp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:22:15.163830+00:00 Debian Importer Fixing VCID-v9ua-1tey-cyaa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:21:21.116057+00:00 Debian Importer Fixing VCID-cmnc-fyxb-rfd4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:18:47.020116+00:00 Debian Importer Fixing VCID-rsy6-acfe-ffb5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:18:42.577028+00:00 Debian Importer Fixing VCID-uuc6-a3xx-6khk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:15:38.911075+00:00 Debian Importer Fixing VCID-dwy5-7rms-rkg6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:13:33.800832+00:00 Debian Importer Fixing VCID-wk26-kc1d-9qcy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:12:06.275250+00:00 Debian Importer Fixing VCID-mqte-f1hw-2ya5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:11:26.107069+00:00 Debian Importer Fixing VCID-awnf-jwg6-k3bk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:09:35.862718+00:00 Debian Importer Fixing VCID-t769-2t1u-57b6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:05:58.186379+00:00 Debian Importer Fixing VCID-qd97-asaa-2fey https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:03:05.352559+00:00 Debian Importer Fixing VCID-9tnr-m8mg-3ffw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:00:00.143882+00:00 Debian Importer Fixing VCID-bd6g-ev4d-kyf6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:59:51.138782+00:00 Debian Importer Fixing VCID-akhr-nck5-sfh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:59:37.981690+00:00 Debian Importer Fixing VCID-4sv2-j8zg-xkhf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:59:34.645421+00:00 Debian Importer Fixing VCID-pv9q-fcta-ffbq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:53.733763+00:00 Debian Importer Fixing VCID-9tc4-qr6d-6kfu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:53:47.125046+00:00 Debian Importer Fixing VCID-avgs-nz9j-gqg8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:53:26.581778+00:00 Debian Importer Fixing VCID-z23q-ts2f-17a3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:52:20.618003+00:00 Debian Importer Fixing VCID-5srb-q1nd-1qfh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:52:18.935155+00:00 Debian Importer Fixing VCID-t8mb-cdc3-6ydq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:48:40.193618+00:00 Debian Importer Fixing VCID-ax8a-z9s4-e3dk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:45:44.844603+00:00 Debian Importer Fixing VCID-efvs-1tuf-guf4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:41:46.265570+00:00 Debian Importer Fixing VCID-yfmg-82tr-gfec https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:40:28.052137+00:00 Debian Importer Fixing VCID-1rj3-tt63-4yc1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:45.457726+00:00 Debian Importer Fixing VCID-cfqv-7r6b-g3e9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:33:55.351501+00:00 Debian Importer Fixing VCID-hhu1-cgcx-nfev https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:24.599000+00:00 Debian Importer Fixing VCID-754j-7erb-z7ae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:26:08.388384+00:00 Debian Importer Fixing VCID-2z7p-2uj3-2qfb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:25:23.105122+00:00 Debian Importer Fixing VCID-8kgq-qhy6-e3c2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:22:47.435250+00:00 Debian Importer Fixing VCID-19r2-4svk-uydr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:21:13.551388+00:00 Debian Importer Fixing VCID-9u64-4cr7-w3e1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:17:15.292024+00:00 Debian Importer Fixing VCID-xrg1-azru-5qf1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:40.534893+00:00 Debian Importer Fixing VCID-bsnh-1chq-z7ae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:01.949197+00:00 Debian Importer Fixing VCID-ebhp-kzkz-euhu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:12:51.911467+00:00 Debian Importer Fixing VCID-pst5-367g-h7cs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:55.193073+00:00 Debian Importer Fixing VCID-4r8e-64b6-bbbu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:08:21.340570+00:00 Debian Importer Fixing VCID-wzxk-316c-xqcg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:07:06.202168+00:00 Debian Importer Fixing VCID-6h7s-a74e-33c1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:05:16.159537+00:00 Debian Importer Fixing VCID-cw2e-p5x2-j7fu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:02:37.679998+00:00 Debian Importer Fixing VCID-1dkk-86db-s3ch https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:02:06.996776+00:00 Debian Importer Fixing VCID-vtjf-sufh-p3h4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:48.392660+00:00 Debian Importer Fixing VCID-1z5d-4wfm-8yfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:03.812986+00:00 Debian Importer Fixing VCID-krg2-d4vy-z7fu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:17.936377+00:00 Debian Importer Fixing VCID-pmkt-c3bw-zkhz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:48:08.787823+00:00 Debian Importer Fixing VCID-mp4n-ez8p-63ek https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:13.640929+00:00 Debian Importer Fixing VCID-zjn8-79ab-tqd3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:02.566472+00:00 Debian Importer Fixing VCID-74zp-pzc4-efhm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:43:29.884774+00:00 Debian Importer Fixing VCID-8cv4-kvfj-4uek https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:43:10.696516+00:00 Debian Importer Fixing VCID-3sjh-f264-m3g7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:31.517114+00:00 Debian Importer Fixing VCID-pn68-e9g7-qbf1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:02.081339+00:00 Debian Importer Fixing VCID-x8sj-apw2-e3h6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:04.224545+00:00 Debian Importer Fixing VCID-5zmj-5xkc-zkgc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:38:45.156542+00:00 Debian Importer Fixing VCID-e7p8-zrwx-5ug6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:03.428047+00:00 Debian Importer Fixing VCID-kpun-mgtm-5uhd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:56.213690+00:00 Debian Importer Fixing VCID-h4r6-jrxh-6kcf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:53.087655+00:00 Debian Importer Fixing VCID-2a5d-8cac-mkft https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:51.128385+00:00 Debian Importer Fixing VCID-6s88-vfr8-u3hj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:09.574137+00:00 Debian Importer Fixing VCID-9dpt-xfu6-cuh5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:19:08.223422+00:00 Debian Importer Fixing VCID-snbc-j4e3-uff1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:45.200959+00:00 Debian Importer Fixing VCID-6zjy-1agk-nbd9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:12.819603+00:00 Debian Importer Fixing VCID-vzg5-b77s-g3ft https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:55.801993+00:00 Debian Importer Fixing VCID-n8hk-44ah-bugr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:09.137542+00:00 Debian Importer Fixing VCID-dveb-sthz-bkgu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:19.651627+00:00 Debian Importer Fixing VCID-u5n5-6h82-tqhw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:58.594738+00:00 Debian Importer Fixing VCID-yust-3g8v-muas https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:52.496861+00:00 Debian Importer Fixing VCID-7u5b-uzd5-7kdc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:32.262307+00:00 Debian Importer Fixing VCID-7939-5qcd-tqgg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:55:17.015730+00:00 Debian Importer Fixing VCID-myv9-89b8-w7dm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:25.420656+00:00 Debian Importer Fixing VCID-4c3c-ygt3-kbg5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:05.782042+00:00 Debian Importer Fixing VCID-1jvh-anus-rfeg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:02.842887+00:00 Debian Importer Fixing VCID-a2as-nfu2-ykax https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:26.745342+00:00 Debian Importer Fixing VCID-s3vw-7gyn-ubdt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:30.123631+00:00 Debian Importer Fixing VCID-sjy7-cp3x-nfh2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:10.539287+00:00 Debian Importer Fixing VCID-mkyz-6v1k-wyen https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:24.617966+00:00 Debian Importer Fixing VCID-vun4-z8ju-gbbc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:57.307028+00:00 Debian Importer Fixing VCID-7sbd-1n7f-ryed https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:23.853787+00:00 Debian Importer Fixing VCID-tq43-rx5u-eybv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:55:02.704439+00:00 Debian Importer Fixing VCID-efvs-1tuf-guf4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:02.662145+00:00 Debian Importer Fixing VCID-4r8e-64b6-bbbu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:57.215394+00:00 Debian Importer Fixing VCID-pn68-e9g7-qbf1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:56.658111+00:00 Debian Importer Fixing VCID-9tnr-m8mg-3ffw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:56.217135+00:00 Debian Importer Fixing VCID-n8hk-44ah-bugr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:56.117322+00:00 Debian Importer Fixing VCID-7939-5qcd-tqgg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:55.562579+00:00 Debian Importer Fixing VCID-754j-7erb-z7ae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:54.968530+00:00 Debian Importer Fixing VCID-avgs-nz9j-gqg8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:53.612939+00:00 Debian Importer Fixing VCID-zdbt-zhtq-xfhj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:51.794802+00:00 Debian Importer Fixing VCID-jebk-6hja-ukfc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:51.687029+00:00 Debian Importer Fixing VCID-bsnh-1chq-z7ae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:51.638141+00:00 Debian Importer Fixing VCID-kpun-mgtm-5uhd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:51.588699+00:00 Debian Importer Fixing VCID-pmkt-c3bw-zkhz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:51.539428+00:00 Debian Importer Fixing VCID-k3ec-bt9r-pkhg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:51.490748+00:00 Debian Importer Fixing VCID-1z5d-4wfm-8yfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:51.274106+00:00 Debian Importer Fixing VCID-b6ug-rdyx-4uaw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:51.225381+00:00 Debian Importer Fixing VCID-62zr-8w1c-bydt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:51.176508+00:00 Debian Importer Fixing VCID-3sjh-f264-m3g7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:51.127565+00:00 Debian Importer Fixing VCID-pst5-367g-h7cs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:51.079072+00:00 Debian Importer Fixing VCID-qd97-asaa-2fey https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:50.150475+00:00 Debian Importer Fixing VCID-t8mb-cdc3-6ydq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:49.911825+00:00 Debian Importer Fixing VCID-4vps-3cxv-xyd5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:49.213730+00:00 Debian Importer Fixing VCID-yust-3g8v-muas https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:48.389448+00:00 Debian Importer Fixing VCID-tjp3-ck7p-5qg3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:47.711460+00:00 Debian Importer Fixing VCID-e7p8-zrwx-5ug6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:47.451074+00:00 Debian Importer Fixing VCID-f4ja-2ydw-cufu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:47.349807+00:00 Debian Importer Fixing VCID-7u5b-uzd5-7kdc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:45.082174+00:00 Debian Importer Fixing VCID-vw4n-4r41-ukbp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:45.040291+00:00 Debian Importer Fixing VCID-zjn8-79ab-tqd3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:44.660087+00:00 Debian Importer Fixing VCID-6zjy-1agk-nbd9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:44.504832+00:00 Debian Importer Fixing VCID-1dkk-86db-s3ch https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:44.284683+00:00 Debian Importer Fixing VCID-6s88-vfr8-u3hj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:44.180306+00:00 Debian Importer Fixing VCID-tq43-rx5u-eybv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:44.138496+00:00 Debian Importer Fixing VCID-snbc-j4e3-uff1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:44.035936+00:00 Debian Importer Fixing VCID-9dpt-xfu6-cuh5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:43.987846+00:00 Debian Importer Fixing VCID-19r2-4svk-uydr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:43.940164+00:00 Debian Importer Fixing VCID-pv9q-fcta-ffbq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:43.897761+00:00 Debian Importer Fixing VCID-cfqv-7r6b-g3e9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:43.681459+00:00 Debian Importer Fixing VCID-7sbd-1n7f-ryed https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:43.527905+00:00 Debian Importer Fixing VCID-tfny-yt17-mffx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:43.479767+00:00 Debian Importer Fixing VCID-ygrd-4scr-wkau https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:43.437710+00:00 Debian Importer Fixing VCID-j2ax-jb2h-byeu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:43.388292+00:00 Debian Importer Fixing VCID-xrg1-azru-5qf1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:42.732002+00:00 Debian Importer Fixing VCID-s3vw-7gyn-ubdt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:42.474056+00:00 Debian Importer Fixing VCID-a2as-nfu2-ykax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:42.039244+00:00 Debian Importer Fixing VCID-ebhp-kzkz-euhu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:41.994201+00:00 Debian Importer Fixing VCID-2a5d-8cac-mkft https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:41.704590+00:00 Debian Importer Fixing VCID-f8c7-p8nz-bbap https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:41.661921+00:00 Debian Importer Fixing VCID-cmnc-fyxb-rfd4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:41.419284+00:00 Debian Importer Fixing VCID-mp4n-ez8p-63ek https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:41.034549+00:00 Debian Importer Fixing VCID-dveb-sthz-bkgu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:40.895942+00:00 Debian Importer Fixing VCID-u5n5-6h82-tqhw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:40.463926+00:00 Debian Importer Fixing VCID-c52k-tg8d-sbeg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:39.825765+00:00 Debian Importer Fixing VCID-v9ua-1tey-cyaa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:38.436552+00:00 Debian Importer Fixing VCID-qv7a-3c41-x3cr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:38.388579+00:00 Debian Importer Fixing VCID-8kgq-qhy6-e3c2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:38.136316+00:00 Debian Importer Fixing VCID-akhr-nck5-sfh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:38.101783+00:00 Debian Importer Fixing VCID-cw2e-p5x2-j7fu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:37.901075+00:00 Debian Importer Fixing VCID-vzg5-b77s-g3ft https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:37.419374+00:00 Debian Importer Fixing VCID-wzxk-316c-xqcg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:37.230740+00:00 Debian Importer Fixing VCID-dwy5-7rms-rkg6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:37.195915+00:00 Debian Importer Fixing VCID-1jvh-anus-rfeg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:37.147372+00:00 Debian Importer Fixing VCID-6dgw-qbue-nqax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:37.099110+00:00 Debian Importer Fixing VCID-mup7-wezz-gkgc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:36.126951+00:00 Debian Importer Fixing VCID-8uk6-x62z-uybr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:35.684915+00:00 Debian Importer Fixing VCID-mqte-f1hw-2ya5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:35.497648+00:00 Debian Importer Fixing VCID-tnxh-tgsm-tuex https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:35.408726+00:00 Debian Importer Fixing VCID-rsy6-acfe-ffb5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:33.689736+00:00 Debian Importer Fixing VCID-yfmg-82tr-gfec https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:33.452052+00:00 Debian Importer Fixing VCID-t769-2t1u-57b6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:33.266177+00:00 Debian Importer Fixing VCID-9y48-sjn7-rqeu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:33.170358+00:00 Debian Importer Fixing VCID-hhu1-cgcx-nfev https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:33.128131+00:00 Debian Importer Fixing VCID-1rj3-tt63-4yc1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:33.037055+00:00 Debian Importer Fixing VCID-74zp-pzc4-efhm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:32.946117+00:00 Debian Importer Fixing VCID-7fvy-7hpe-kbej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:32.904330+00:00 Debian Importer Fixing VCID-vtjf-sufh-p3h4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:32.723736+00:00 Debian Importer Fixing VCID-mkyz-6v1k-wyen https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:32.540590+00:00 Debian Importer Fixing VCID-q5ch-b97k-k3hp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:32.499449+00:00 Debian Importer Fixing VCID-x8sj-apw2-e3h6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:32.242001+00:00 Debian Importer Fixing VCID-5aga-y5nk-5fha https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:32.114467+00:00 Debian Importer Fixing VCID-q77k-hc9g-9fhm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:30.409099+00:00 Debian Importer Fixing VCID-4c3c-ygt3-kbg5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:30.072286+00:00 Debian Importer Fixing VCID-m92a-91pv-dffv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:29.694428+00:00 Debian Importer Fixing VCID-urpr-qse2-7kcf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:28.777275+00:00 Debian Importer Fixing VCID-vun4-z8ju-gbbc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:28.691765+00:00 Debian Importer Fixing VCID-qhwf-9n5n-hbaa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:28.650212+00:00 Debian Importer Fixing VCID-wk26-kc1d-9qcy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:28.607273+00:00 Debian Importer Fixing VCID-h4r6-jrxh-6kcf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:28.563699+00:00 Debian Importer Fixing VCID-awnf-jwg6-k3bk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:28.519963+00:00 Debian Importer Fixing VCID-9tc4-qr6d-6kfu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:28.476176+00:00 Debian Importer Fixing VCID-6h7s-a74e-33c1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:27.850274+00:00 Debian Importer Fixing VCID-5666-pp89-aqc2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:27.643425+00:00 Debian Importer Fixing VCID-8hgj-7cb6-fbbp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:27.518382+00:00 Debian Importer Fixing VCID-2z7p-2uj3-2qfb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:27.435078+00:00 Debian Importer Fixing VCID-uuc6-a3xx-6khk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:27.225344+00:00 Debian Importer Fixing VCID-ax8a-z9s4-e3dk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:26.680280+00:00 Debian Importer Fixing VCID-g2et-bnvt-9fem https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:26.548830+00:00 Debian Importer Fixing VCID-krg2-d4vy-z7fu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:26.382664+00:00 Debian Importer Fixing VCID-4sv2-j8zg-xkhf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:26.215948+00:00 Debian Importer Fixing VCID-b8qk-zbj4-yfg2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:25.921504+00:00 Debian Importer Fixing VCID-8cv4-kvfj-4uek https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:24.839034+00:00 Debian Importer Fixing VCID-5zmj-5xkc-zkgc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:24.421499+00:00 Debian Importer Fixing VCID-myv9-89b8-w7dm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:22.767770+00:00 Debian Importer Fixing VCID-bd6g-ev4d-kyf6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:22.562754+00:00 Debian Importer Fixing VCID-5c1p-6gjw-wkgx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:22.023993+00:00 Debian Importer Fixing VCID-sjy7-cp3x-nfh2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:21.476824+00:00 Debian Importer Fixing VCID-5srb-q1nd-1qfh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:19.984788+00:00 Debian Importer Fixing VCID-9u64-4cr7-w3e1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:19.522753+00:00 Debian Importer Fixing VCID-z23q-ts2f-17a3 https://security-tracker.debian.org/tracker/data/json 38.1.0